Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Traditionally unmanned undersea vehicles (UUVs) have been large, complex and expensive. Development of UUVs has been driven by defense and commercial requirements. This has allowed for extensive research and development budgets and long development cycles. This paper briefly discuses these historic drivers and how this situation has changed. It focuses on a new compact affordable UUV. In 2015, several...
Traditional methods of system verification call for the repeated exercise of that system in its intended environment to give confidence that it will operate as designed. Autonomous systems, however, are systems designed for sophisticated operation in stochastic environments that specifically handle the unexpected; testing all possible operational scenarios for such systems is intractably complex....
In this work, a method to design STIM for sensor network system is proposed. Hardware selects TMS320F28335 as main controller. A common software implementation method is also presented. Electronic spreadsheet and independent interface configuration is the key research points to realize hot-plug function. After testing, system can be used in electric transmission line leakage current and voltage detection...
This paper deals with the electric field analysis of 150 kV compact transmission line. The 150 kV compact transmission line is constructed by reusing existing right of way, occupied by existing distribution lines. The 150 kV compact transmission line is designed by mutual utilization of the 150 kV transmission line with 20 kV distribution line. The electric field of the transmission line was calculated...
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space description, and optionally the covariance matrices and Kalman predictor gain, using input and output (I/O) trajectories. For flexibility, separate applications are offered...
Determinism is a key concern in the certification of software for safety-critical systems. In this paper, we evaluate the role of determinism in certification standards, using airborne software as example. We analyze and speculate how the requirements and underlying concepts related to determinism can be adapted for Machine Learning algorithms.In addition, we systematically identify and analyze a...
Market readiness of on-board automotive software-intensive systems is tightly linked to the availability of appropriate certification schemes aimed at keeping the car makers confident and the consumers safe - especially in the context of Autonomous Driving, which is the next frontier of the automotive industry. Advanced driver assistance systems (ADAS) are going to be pervasively used in modern automobiles...
In order to develop the bottom driver software more rapidly and efficiently which are used in automotive battery management system and to get rid of high dependence on the hardware and low reusability of the drivers in automobile controller, this paper puts forward a kind of driver design method based on automotive open system architecture (AUTOSAR). Simulation modeling module has been made with the...
Most view-based modelling approaches are today based on a "synthetic" approach in which the views hold all the information modelled about a system and are kept consistent using explicit, inter-view correspondence rules. The alternative "projective" approach, in which the contents of views are "projected" from a single underlying model on demand, is far less widely used...
Remote Laboratories are used in educational settings as tools to give students access to experiments that are not physically available to them at their institutions. During implementation, problems such as: bandwidth, security or limitations in terms of the usability, have been identified. This paper proposes an approach that integrates, what we call, a Smart Adaptive Remote Laboratory (SARL) with...
Line impedance stabilization network (LISN) is an important tool to provide noiseless power supply in electromagnetic compatibility (EMC) testing. There are several brands of LISN that are recognized in the market. However, the quality of measurement provided by the LISN is not dependent upon the quality of the product, but also its application scheme. This paper investigates the effect of grounding...
Modern software development is increasingly collaborative. Open Source Software (OSS) are the bellwether; they support dynamic teams, with tools for code sharing, communication, and issue tracking. The success of an OSS project is reliant on team communication. E.g., in issue discussions, individuals rely on rhetoric to argue their position, but also maintain technical relevancy. Rhetoric and technical...
Numerical algorithms are used in many areas but they rely on approximate computations due to the finite precision computer arithmetic. As critical systems perform more and more calculations, needs for verification and validation techniques and for assisted development increase, the computer arithmetics being particularly not intuitive. It is then necessary to provide tools to the programmers, to help...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
In this study conducted numerical experiments aimed to determine the physical shielding factors (PSF) for two different MOSFET structures. The purpose of this paper was to present the new possibilities of the Monte Carlo numerical simulations for interaction of gamma irradiation of 60Co and 137Cs with semiconductor devices that are often located as dosimeters together with complex electronics power...
The IEEE 1516-2010 — Standard for Modeling and Simulation High Level Architecture (HLA) range of standards are widely used for distributed simulation, interoperability, reusability and the modeling of large-scale systems in many application domains. Although it provides several advantages, the development of distributed simulations based on the HLA standards remains a challenging task that requires...
This paper presents a design of command queuing engine in eMMC5.1 host system. With the proposed engine, multiple commands can be collected and executed in order of priority instead of executed as they arrive. The proposed engine helps reducing latency on small data transfers so that performance in multitasking scenarios is improved. This design is verified by simulation for various requests and the...
The paper presents the validation of the implementation made by the user of the standard wall function for the standard k-ε turbulence model against the built-in standard wall function for the standard k-ε turbulence mode, in numerical computation software (ANSYS Fluent). A comparison was made between the results of two flow simulations: the first case consisted in using the built-in standard wall...
Modern systems are becoming ever more complex and, thus, the possibility of failures in their operation is also growing. The complexity makes it practically impossible to make the hardware and software error-free without the special effort invested in the design process. Recently, a design methodology with the objective to avoid unacceptable risk of physical injury or of damage to the health of people,...
This paper presents an analysis of advancing a code compliant single detached dwelling in Ontario, Canada to Passive House Standard energy efficiency level. The research was based on comparing energy models built with the Passive House Planning Package, and included thermal bridging calculations performed in the THERM software. For each energy model, only the effect of improved exterior insulation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.